Military strategy

Xem 1-20 trên 29 kết quả Military strategy
  • Games of Strategy: Theory and Applications, originally published by Prentice Hall in 1961, was written by Melvin Dresher, a RAND research mathematician, during the heyday of Game Theory at RAND. This book introduced readers to the basic concepts of game theory and its applications for military, economic, and political problems,

    pdf0p xuancoem 02-02-2013 26 9   Download

  • Preface The game of Xiangqi is similar to the deployment of forces for military operation. Though it is a battle on xiangqi board, its theory is similar to the military strategy and tactics. As it is stipulated by the xiangqi rules, the side that captures the opponent's King will be the winner of the game. Therefore, each side tries to outwit his opponent and strives to show his bravery in taking various kinds of checkmate methods and to do his best to seize every opportunity for winning the victory. The game of xiangqi is rendered with a mysterious hue. Nearly...

    pdf222p transang5 23-10-2012 25 8   Download

  • In the third century of the Common Era (CE), when Rome dominated not only Europe, but also North Africa and the Near East, it was able to deploy fifty legions throughout the empire. In this forward defense strategy even the furthermost areas of the empire were secured by the on-site presence of an adequate number of legions of the Roman army. However, the empire had lost much of its muscle by the fourth century CE and the forces of Rome had diminished to only about twenty-five legions.

    pdf89p camchuong_1 10-12-2012 24 4   Download

  • The Army cannot effectively project power if it cannot get to where it needs to go to confront future adversaries. The authors of this report developed scenarios and conducted political-military games to determine what strategies, tactics, and capabilities potential adversaries might use to prevent or complicate U.S. access to

    pdf0p xuancoem 01-02-2013 22 3   Download

  • When The Compleat Strategyst was originally published in 1954, game theory was an esoteric and mysterious subject, familiar only to specialized researchers, particularly in the military. Its prominence today can be traced at least in part to this classic book, which popularized the subject for amateurs, professionals, and students

    pdf0p xuancoem 02-02-2013 16 3   Download

  • Rather than celebrating warfare, 50 Battles That Changed the World looks at the clashes the author believes have had the most profound impact on world history. Listed in order of their relevance to the modern world, they range from the ancient past to the present day and span the globe many times over. This book is not so much about military strategy as the implications of the battles that were vital in shaping civilization as we know it. Some of the battles in this book are familiar to us all-Bunker Hill, which prevented the American Revolution from being stillborn, and...

    pdf321p transang4 10-10-2012 45 21   Download

  • Terrain models have always appealed to military personnel, planners, landscape architects, civil engineers, as well as other experts in various earth sciences. Originally, terrain models were physical models, made of rubber, plastic, clay, sand, etc. Since the later 1950s, the computer has been introduced into this area and the modeling of terrain surface has since then been carried out numerically or digitally, leading to the current discipline— digital terrain modeling.

    pdf324p crazy_sms 10-05-2012 54 15   Download

  • Data fusion is a research area that is growing rapidly due to the fact that it provides means for combining pieces of information coming from different sources/sensors, resulting in ameliorated overall system performance (improved decision making, increased detection capabilities, diminished number of false alarms, improved reliability in various situations at hand) with respect to separate sensors/sources.

    pdf246p crius75 02-01-2013 32 8   Download

  • The authorities have made continuous efforts to build benchmarks at different points along the yield curve. The aim of this strategy is to further develop the interest rate term structure in the local currency, which would allow better pricing and liquidity of bonds issued both by the government itself and by the private sector. To this end, the authorities have increased the average maturity of the outstanding debt and smoothed its maturity profile.

    pdf19p hongphuocidol 04-04-2013 30 5   Download

  • The aim of this paper is to compare pricing and performance of mutual funds with two types of guarantees: a lookback guarantee and an interest rate guarantee. In a simulation analysis of different portfolios based on stock, bond, real estate and money market indexes, we first calibrate guarantee costs to be the same for both investment guarantee funds. Second, their performance is contrasted, measured with the Sharpe ratio, omega and Sortino ratio, and a test with respect to first-, second- and third-order stochastic dominance is provided.

    pdf19p quaivatdo 18-11-2012 22 4   Download

  • The concept of fungibility of aid resources highlights the fact that donor funded projects can simply allow partner governments to re-direct their own financial resources to other purposes (assuming that govern- ments would have spent their own money on the project(s) even if the donor funding was not available). For example, donor funding of Euro 100m to the Health Sector of a particular country could allow the partner government to then use (or ‘divert’) Euro 100m of its own resources (which it otherwise would have had to allocate to Health) to fund other uses (e.g.

    pdf46p tainhacmienphi 25-02-2013 14 4   Download

  • In recent years, malware has become a widespread prob- lem. Compromised machines on the Internet are generally referred to as bots, and the set of bots controlled by a single entity is called a botnet. Botnet controllers use techniques such as IRC channels and customized peer-to-peer proto- cols to control and operate these bots. Botnets have multiple nefarious uses: mounting DDoS attacks, stealing user passwords and identities, generat- ing click fraud [9], and sending spam email [16].

    pdf8p nhacsihuytuan 06-04-2013 23 4   Download

  • The Clean Water and Drinking Water State Revolving Funds are provided $2 billion in FY 2013. As part of the Administration’s long-term strategy, the EPA is implementing a Sustainable Water Infrastructure Policy that focuses on working with states and communities to enhance technical, managerial and financial capacity. Important to the enhanced technical capacity will be alternatives analyses to expand "green infrastructure" options and their multiple benefits.

    pdf0p nhacsihuytuan 13-04-2013 13 2   Download

  • Appreciating the complexity of interrelated problems and re- gional dimensions is a first step towards assessing what capa- bilities are required. The challenges facing Afghanistan represent a combination of terrorism and organised crime, involving drug trafficking and illegal arms trading, in a wid- er regional dimension, where radicalisation is rife. Terrorism and sectarian instability are actively advanced by both non- state actors and regional players.

    pdf152p thamgiacongdong 02-05-2013 14 2   Download

  • It will be remembered by those connected with the military service that towards the end of the late Civil War, there went through the camps and barracks of the volunteer soldiers agents of publishing houses busily engaged in procuring material for "company histories," and still more anxiously soliciting subscriptions for the same.

    pdf29p nhokheo9 06-05-2013 17 2   Download

  • The People’s Republic of China has often used force in ways that surprised and perplexed other countries. The Chinese appear to believe that, by carefully designing military operations to achieve maximum political effect, they can successfully use force even when the overall military balance is unfavorable. China’s past successes in using force in this way while avoiding a massive reaction from its adversaries may give it confidence that it

    pdf0p xuan2013 25-01-2013 14 1   Download

  • The Navy manages its officer corps with the primary goal of meeting the national security and military strategies. Within that broad goal, it also manages its officers to provide them with individual opportunities and a reasonable quality of life, in the most cost-effective way, within a framework of law, policy, and practice. The Navy

    pdf0p xuancoem 01-02-2013 15 1   Download

  • The battle for Gaza revealed an extremist strategy: hiding in cities and provoking attack to cause civilian deaths that can be blamed on the attacking forces. The U.S. and allied militaries, having no options but lethal force or no options at all, are ill-equipped to defeat this strategy. The use of lethal force in dense populations can harm

    pdf0p trinhosieupham 05-02-2013 11 1   Download

  • Because future military operations are likely to include actions in densely populated, built-up areas, joint and service training initiatives over the past decade have increasingly reflected an interest in preparing for such contingencies. To assist the military community in better orchestrating its resources to improve forcewide

    pdf1p trinhosieupham 06-02-2013 13 1   Download

  • This influential study, originally published in 1951, provides insight into the political leadership and foreign policy in the Soviet Union and other communist states; the development of Soviet military strategy and doctrine; and the organization and operation of the Soviet economy. It was the inaugural publication in what was then called ...

    pdf0p trinhosieupham 19-02-2013 21 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản